#1
Which of the following is a common method for securing classified information?
Using strong encryption
ExplanationEncrypting data enhances security.
#2
What is the primary purpose of security clearances?
To restrict access to classified information
ExplanationClearances limit access to sensitive data.
#3
Which of the following is NOT a common type of security threat in classified environments?
Biometric authentication
ExplanationBiometric authentication is a security measure.
#4
What is the purpose of a VPN (Virtual Private Network) in classified environments?
To create a secure connection over the internet
ExplanationVPN ensures secure internet connections.
#5
What is the purpose of an Intrusion Detection System (IDS) in classified environments?
To detect and alert on suspicious activities or potential security breaches
ExplanationIDS detects and alerts on security issues.
#6
Which of the following is an example of a physical security measure?
Biometric scanners
ExplanationBiometric scanners are a physical security measure.
#7
What is the concept of 'need-to-know' basis in classified environments?
Access is restricted to only those who need the information to perform their job duties
ExplanationLimiting access to necessary personnel.
#8
Which of the following is a best practice for securing classified communications?
Using end-to-end encryption
ExplanationEnd-to-end encryption for communication security.
#9
What is the purpose of a security audit in classified environments?
To identify vulnerabilities and ensure compliance with security policies
ExplanationAudit ensures compliance and identifies weaknesses.
#10
Which of the following is a common physical security measure used to protect classified information?
CCTV surveillance
ExplanationCCTV surveillance is a physical security measure.
#11
What is a 'mantrap' in the context of security?
An area with double entry points to control access
ExplanationDouble entry points for access control.
#12
What does the term 'compartmentalization' refer to in classified environments?
The division of classified information into smaller, secure sections
ExplanationSecuring information through division.
#13
What does the term 'TEMPEST' refer to in the context of classified environments?
Protecting against electronic eavesdropping
ExplanationTEMPEST protects against electronic eavesdropping.
#14
What is the purpose of a security awareness training program?
To educate employees about security risks and best practices
ExplanationTraining educates on security risks and practices.
#15
What is the purpose of role-based access control (RBAC) in classified environments?
To grant access based on job roles and responsibilities
ExplanationRBAC assigns access based on job roles.